Data masking
Another method that can be used to render data unusable but recognizable is data masking. This method is commonly used in processes where there is human interaction. An example would be looking at your stored credit card information at an online retailer. Typically, your credit number will be masked (series of asterisks) except for the last four digits, so you can identify the card stored while not divulging the full number. This is done so that if your account is compromised, the number is not there to be stolen and used for fraudulent purchases. A similar method can be achieved in database views and specialized encryption solutions to enforce the least privilege and access only on a need-to-know basis.
This solution has pros and cons that should be considered prior to selection as a method to protect sensitive data. Masking as used on a database implementation is simply a view presented with the original data intact and viewable by database administrators. While the solution...